第一篇:研究生必备外文论坛与资料网站范文
如何在校外下载期刊全文(在校生,写论文,未来工作,都非常实用)
马上就要工作了,觉得学校里面图书馆资料很多,并且很有用,都可以在中文CNKI数据库,和西文数据库荷兰DOS中全文下载,但是仅仅限于校内IP用户。到了工作单位上,想进入这些数据库查资料就很不容易了。。并且要收很高昂的费用。。离开了学校才知道学校里面这么好的电子图书馆的资源当时没有好好利用。
所以在网上找到了在家里和单位都能下载全文的地方。
下面是几年来收集整理的全文下载地址和心得,都是网友的无私奉献和结晶,我把分散的信息总结出来,希望对大家有用,有些地址和进入方式可能过期了,我没有一一核对,希望多多理解和包涵。
全文期刊:
EBSCO/UMI/SDOS三个数据库扫荡一下,这三本都有全文。
硕博论文全文下载
http://202.120.13.45/umi/index.htm ,这是英文的博士论文。
中国期刊网是中文学位论文
图书馆全文无法下载,需要用户卡
图书馆全文下载数据库
PQDD
上海高校就业、户口、评优、毕业政策咨询请加417472079,颜老师
伦敦政治经济学院 http://www.lse.ac.uk/rescources/podcasts/Default.htm 普林斯顿大学 http://uc.princeton.edu/main/index.php 英国泰晤士报MBA http://uc.princeton.edu/main/index.php 耶鲁大学 http://www.yale.edu/opa/podcast/
上海高校就业、户口、评优、毕业政策咨询请加417472079,颜老师
第二篇:android学习资料(网站,论坛)
最近整理了一下关于Android的学习资料,和大家分享一下。论坛:
1.http://www.xiexiebang.com/ http://www.xiexiebang.com/s 视频
ed2k://|file|3G%E5%BA%94%E7%94%A8%E4%B9%8BAndroid%E4%BC%A0%E6%99%BA%E8%A7%86%E9%A2%91%E8%AE%B2%E8%A7%A3.zip|1562550506|9d40b75146523eda0b93e8f5a61ae66e|h=nnyxecc6g5lspkdmjxvgpkqxqng3pw6o|/
android市场
http://www.xiexiebang.com/market/#app=com.wsl.CardioTrainer
第三篇:网站远程管理外文翻译
湖北大学本科毕业论文(设计)外文翻译
外文翻译:
浅谈网络中的远程控制
原文来源:
Rabiner, L.R.;Gold, B.Englewood Cliffs, N.J., Prentice-Hall, Inc., 2009 p.译文正文:
摘要:在网络高速发展的今天,随着计算机应用的普及,远程控制也逐渐被人们所关注。远程控制是网络的一大优势,在网络管理、远程协作、远程办公等计算机领域都有着广泛的应用,它进一步克服了由于地域性的差异而带来的操作中的不便性,使得网络的效率得到了更大的发挥。远程控制可通过多种方法加以实现。关键词:远程控制;遥控操作;技术应用;实现方法 计算机远程控制
计算机远程控制是在网络上由一台电脑(主控端Remote/客户端)远距离去控制另一台电脑(被控端Host/J]服务器端)的技术⋯。这里的远程不是字面意思的远距离,而是指通过网络来对远端的计算机实施遥控。
远程控制只是通过网络来操纵计算机的一种手段而已,只要运用得当,操纵远程的计算机也就如同你操纵眼前正在使用的计算机一样没有任何区别。当操作者使用主控端电脑控制被控端电脑时,就如同坐在被控端电脑的屏幕前一样,可以启动被控端电脑的应用程序,可以使用被控端电脑的文件资料,甚至可以利用被控端电脑的外部打印设备和通信设备来进行打印和访问互联网。在这个过程中主控端电脑只是将键盘和鼠标的指令传送给远程电脑,同时将被控端电脑的屏幕画面通过通信线回传过来。也就是说,我们控制被控端电脑进行操作似乎是在眼前的电脑上进行的,实质是在远程的电脑中实现的,不论打开文件,还是上网浏览、下载,所有的资料和上网等都是存储在远程的被控端电脑中的。
实行远程控制,实际上就是一个服务器程序(以下简称被控程序)和一个客户程序(以下简称主控程序),被控方即为服务器程序,它监听客户的请求,并做出处理;主控方即为客户程序,它连接上服务器后,发出自己的请求,服务器便根据客户的请求做出不同的响应。远程控制系统组成如图1所示。
当今的远程控制技术支持的网络方式有:LAN、WAN、拨号方式、互联网方式。此外,有的远程控制软件还支持通过串口、并口、红外端口来对远程机进行控制。远程控制克服了由于地域性的差异而带来的操作中的不便性,使得网络的效率得到了更大的发挥。
2远程控制的技术实现
2.1远程控制的原理
“只要网络有通路就可以实现远程控制”,远程控制必须通过网络才能进行。位于本地的、已被安装了客户端程序的主控端是操纵指令的发出端,它像一个普通客户一样向非本地、安装了服务器端程序的被控端发出信号,建立并通过一个特殊的远程服务,使用各种远程控制功能发送远程控制命令,控制被控端电脑中的各种应用程序运行,使得被控端按照主控端的 要求进行各种操作,从而实现远程控制的目的。图2远程控制示意图
湖北大学本科毕业论文(设计)外文翻译
通过网络实现的远程控制示意图如图2所示。
2.2远程控制实现方法
2.2.1 利用微软Windows XP系统中远程控制功能
每台Windows XP电脑都同时包括客户端和服务器端,也就是说它既可以当成客户端来连接其他的Windows XP电脑,也可以将自己当成服务器端,让别的电脑来控制自己。服务器端的系统都是使用Windows XP,而客户端就可以是Windows XP、Windows 2000或者Windows Me,并且对客户端没有语言的限制。用户可以利用远程桌面通过网络对远程计算机进行控制,控制后可以访问所有应用程序、文件和网络资源等。
2.2.2利用一些功能强大的远程控制软件。
远程控制技术发展到今天,产生了许多优秀的远程控制软件,有提供多层次安全防护的远程遥控软件,还有加速远程遥控操作软件,以及更加利于快速文档传送的控制软件。还有如“RemotelyAnywhere”只需在服务器端一次性安装,客户端在网络中不需要再增加任何软件,就可以直接通过浏览器来对服务器进行远程控制。它不仅仅只是让客户端能够远程控制服务器的桌面,还可以给多个用户设置不同的权限,以便让他们根据授权对服务器的文件管理器、注册表等项目进行查询和管理;它允许服务器和客户端之间传递剪贴板,也可实现普通文档的传送。另外,一些集远程控制、数据通信和文件传输等功能于一体,具有很高的数据传输效率和系统安全保障的远程控制系统正在被推广。
2.2.3根据实际需求开发实现远程控制
自行开发实现远程控制,涉及主控机和受控机,故采用Client/Server结构。可以用Delphi编程环境分别在两台不同的电脑上编制控制和被控制程序,一个为Clientdpr.exe,装在受控机上;另一个为Serverdpr.exe,装在主控机上。Serverdpr.exe指定要监视的受控机的IP地址和发送指令给客户机的Clientdpr.exe,客户机的Clientdpr.exe得到指令后,接着在本机执行相应指令,将结果返回给主控机。主控方的功能是这样实现的:读取命令串一将命令串转换成数组一清除内存流一指定目标计算机(通过读取所输入的IP地址)一将指令码发送给目标计算机。当主控机将指令发给受控机后,受控机将在本机上调用Windows的应用程序接口API函数以执行所接收的指令。当受控机接收到数据时,便开始执行主控机发送的操作。具体操作是这样的:读取控制码_+识别控制码一执行相应的过程或API函数以达到相应的功能。结束语
远程控制虽然可以方便地操纵远程计算机,给人们带来很多便利,但它也会由此带来安全方面的隐患。随着远程控制市场的成熟,网络安全变得越发重要,只有彻底解决这一关键问题,才能促进远程控制真正走向应用。
湖北大学本科毕业论文(设计)外文翻译
Remote control of network
Abstract: The rapid development of the network today, with the popularization of computer applications, remote control have gradually been of concern to the people.Network remote control is a major advantage in network management, remote collaboration, remote office and other computer fields have a wide range of applications, it further to overcome regional differences in the operation brought the inconvenience, making the network efficiency Given greater play.Remote control can be achieved through a variety of ways.Keywords: remote control;remote operation;technology;Implementation 1 computer remote control
Computer remote control is on the network by a computer(host Remote / Client)remote to control another computer technology.Here is not the literal meaning of the long-distance remote, but rather through the network to the remote computer on the implementation of remote control.Remote control is to manipulate the computer through the network as a means only, if used properly, will control the remote computer as you manipulate the front of the computer being used as there is no difference.When the operator using the host computer control host computer to host computer as if sitting in front of the screen as the computer can start the host application, you can use the host computer documentation, or even Host computer using the external printing device and communications equipment to print and access the Internet.In this process, host computer is just a keyboard and mouse commands sent to the remote computer, while host computer's screen image come through the communication line return.That is, we control the host computer to operate in front of the computer seems to be carried out, in essence, a remote computer to achieve, whether to open the file, or Web browsing, downloading, all the information and the Internet are all Stored in the remote host computer.Implementation of remote control, in fact, a server program(hereinafter referred to as charged program)and a client(hereinafter referred to as master control program), the prosecution is the server program that listens to customer requests, and to deal with it;Master Is the client side, it is connected to the server, to make their request, the server will be made according to customer's request a different response.Remote control system shown in Figure 1.Today's technical support network remote control methods are: LAN, WAN, dial-up Internet way.In addition, some remote control software also supports serial, parallel, infrared port to control a remote machine.Remote control to overcome regional differences in the operation brought the inconvenience, make the network to play a greater efficiency.2 remote control technology 2.1 Principles of remote control
“As long as the network has access to connect remote control ”, remote control must be carried out through the network.At local, has been installed, the host is a client program to issue control instructions side, it is the same as an ordinary customer to non-local, the installation of the host server program signals, and through the establishment of a special Remote service, using a variety of remote control function to send a remote control command, control, host computers running various applications, making the host in accordance with the master's
湖北大学本科毕业论文(设计)外文翻译
Requirements for various operations, in order to achieve the remote control.Figure 2 Schematic diagram of the remote control
Remote control through the network diagram shown in Figure 2.2.2Implementation of Remote Control 2.2.1 Microsoft Windows XP system using the remote control function
Windows XP computers each include both client and server side, meaning that both can be used as a client to connect to other Windows XP computer, you can also themselves as the server side, so that other computer to control themselves.Server systems are using Windows XP, the client can be Windows XP, Windows 2000 or Windows Me, and the client without language restrictions.Users can use the Remote Desktop computer through the network to the remote control, after controlling for access to all applications, files and network resources.2.2.2 using some powerful remote control software.Remote control technology to today, have a lot of great remote control software, providing multi-level security protection for remote control software, as well as speed up the remote control operating software, and more conducive to the rapid document transmission control software.Also, as “RemotelyAnywhere” just a one-time installation on the server side, the client in the network do not need to add any software to connect directly through the browser on the server for remote control.It is not just the client to remotely control the server's desktop, but also can set different permissions for multiple users so that they are under the authority of the server's file manager, registry, query and manage projects;it allows the server and Clipboard passed between the client can also be transmitted to achieve common document.In addition, some set of remote control, data communications and file transfer and other functions into one, with high data transmission efficiency and system security remote control system is being promoted.2.2.3 Development and implementation of the actual needs of the remote control
Develop their own remote control, involving the host computer and controlled machines, so the use of Client / Server structure.Delphi programming environment can be used separately on two different computers to be controlled preparation of control and procedures, one for Clientdpr.exe, installed in the controlled machine;one for Serverdpr.exe, installed in the main computer on.Serverdpr.exe designated to monitor the controlled machine IP address and send instructions to the client Clientdpr.exe, client Clientdpr.exe get command, and then execute the corresponding instructions in the machine, the results are returned to the host computer.Master side function is implemented as follows: Read command string into a string array of commands to clear the memory of a stream to a specified target computer(by reading the entered IP address)to send the script to a target computer.When the command sent to the host computer controlled machine, the machine will be controlled on the unit's application program interface calls Windows API functions to perform the received command.When the controlled unit receives the data, they begin to send the host computer operation.To do this: Read identification control code _ + implementation of the corresponding control code for a procedure or function to achieve the appropriate API function.3 Conclusion
Although the remote control can easily manipulate the remote computer, to bring a lot of convenience, but it also the resulting security risks.As the market matures remote control, network security becomes more important, only solve this critical issue, to really go for remote
control applications.
第四篇:社交网站_外文翻译
社交网站
我们定义的社交网络站点作为基于Web的服务,允许个人:(1)有界系统内构建一个公共或半公共的配置文件。(2)阐明列表中的其他用户,与他们共享一个连接。
(3)查看和遍历他们的名单和那些由其他系统内的连接。性质和命名这些连接可能会有所不同,从站点到站点。
虽然我们使用的术语―社交网站‖来形容这种现象,―社交网站‖也出现在公共话语中,经常交替使用这两个术语。我们选择不采用―联网‖的原因有两个:重点和范围。―物联网‖强调关系启动,往往陌生人之间。虽然网络是可能在这些网站上,它是不是主要的做法,他们中的许多,也不是有什么区别他们从其他形式的计算机中介传播(CMC)。
是什么让独特的社交网站并不是说他们允许个人见陌生人,而是他们让使用者能够表达,使人们看到他们的社交网络。这可能会导致个人之间的连接,否则不会进行,但往往不是我们的目标,而这些会议之间―的潜在关系‖(Haythornthwaite,2005年)谁分享一些脱机连接频繁。许多大型SNS网站,参与者不一定―网络‖或寻找,以满足新的人,相反,它们是人谁已经扩展社交网络的一部分,他们的主要沟通。为了强调这一点明确的社会网络,这些网站作为一个重要的组织特征,我们将它们标记―社交网站‖。
虽然SNS网站已经实施了各种各样的技术特点,他们的骨干组成可见型材显示铰接式的Friends1谁也系统的用户列表。配置文件是独特的网页,人们可以―输入自己的应运而生‖(松登,2003年,第3页)。在加入一个SNS,一个人被要求填写表格,包含了一系列的问题。回答这些问题,这些问题通常包括描述符,如年龄,位置,兴趣,和一个―关于我‖一节使用该配置文件。大多数网站还鼓励用户上传的个人资料照片。有些网站允许用户添加多媒体内容,或修改他们的个人资料的外观和感觉,以提高他们的档案。其他,如Facebook,允许用户添加模块(―应用程序‖),提高他们的个人资料。
在一个档案中的知名度不同的网站,并根据用户的自由裁量权。默认情况下,型材Friendster和Tribe.net被搜索引擎抓取,使他们的人看到,无论是否观众有一个帐户。另外,LinkedIn的控制的基础上,他或她是否有付费帐户,观众可能会看到什么。像MySpace允许用户来选择他们是否希望他们的个人资料,以成为公众或―朋友只。‖Facebook的一个不同的方法默认情况下,谁是在相同的―网络‖的一部分用户可以查看对方的轮廓,除非一个轮廓所有者已决定拒绝那些在其网络的权限。结构变化的可视性和访问社交网站区别于对方的主要方式之一。
加入一个社交网络站点后,会提示用户识别系统与他们有关系的人在。这些关系的不同而有所不同的标签对网站热门词汇,包括―朋友‖,―联系人‖和―粉丝‖,大多数SNS网站需要双向确认的友谊,但有些则没有。这些单向的关系有时会标示为―粉丝‖或―关注‖,但许多网站称这些朋友。
―朋友‖一词是误导,因为连接并不一定意味着在日常白话感的友谊,人们连接的原因是多种多样的(博伊德,2006A)。
公共显示器的连接是SNS网站的重要组成部分。好友列表中包含链接到每个朋友的个人资料,使观众通过点击好友列表遍历网络图。在大多数网站,好友列表是可见的人谁被允许查看配置文件,但也有例外。例如,一些MySpace的用户已经破解隐藏好友显示他们的个人资料,LinkedIn允许用户选择退出显示其网络。
大多数SNS网站还提供了一种机制,用户朋友的个人资料上留下消息。此功能通常涉及离开―的评论,‖虽然网站使用此功能的各种标签。此外,SNS网站往往有一个私人消息功能类似的webmail。虽然私人消息和评论上流行的主要SNS网站,他们尚未普及。
并非所有的社交网络网站等开始。
QQ作为中国的即时通讯服务,LunarStorm开始作为一个社区网站,赛我网作为韩国的讨论区工具,以及环讯(原Skyblog)的加入SNS功能,是法国前博客服务。
Classmates.com,学校联营公司在1995年推出的一个目录,开始支持SNS网站走红后,铰接式好友列表。在2005-2006年与SNS的功能和结构,然后再重新启动,MiGente AsianAvenue,BlackPlanet早期流行的民族社区网站与好友的功能有限。
虽然SNS网站的设计通常是普及,许多吸引同质人群最初,因此它并不少见找到组使用网站分开自己的国籍,年龄,教育程度,或其他因素,通常段的社会(Hargittai,这个问题)即使那是在没有设计师的意图。字的口碑策略有吸引力,因为他们结合消费者克服阻力显着降低成本和快速的交付,尤其是通过技术,如互联网的前景。不幸的是,目前scantregarding经验证据的相对有效性口碑营销提高企业绩效随着时间的推移。这就提出了一个需要研究企业如何测量WOM通信和口碑如何与其他形式的营销传播效果。
字的口碑营销是互联网上的一个特别突出的特点。互联网为消费者提供了大量的场地,分享自己的观点,喜好,或与别人的经验,以及公司利用口碑营销的机会。正如一位评论家指出,―折腾了数百万美元的超级碗广告,而不是初出茅庐的dot-com公司正试图通过吸引注意力的营销策略,如博客和[口碑]运动‖(2006年,惠特曼B3A页)便宜得多。因此,重要的是要了解是否口碑才是真正有效的,如果是这样,如何与传统营销活动的影响比较。
万维网发展最快的舞台之一是所谓的社交网站的空间。社交网站通常由一小群发送了邀请函,以自己的个人网络的成员加入该网站的创始人发起的。反过来,新的
成员发送邀请到他们的网络,等等。
因此,邀请函(即口碑推荐)网站获得新的成员一直是最重要的推动力。随着社交网站的成熟,他们可能会开始增加他们的传统营销工具的使用。因此,在这个阶段,管理层可能会开始质疑口碑的相对有效性。
本研究的目的是开发和估计一个模型,捕捉新成员收购,口碑转介,与传统营销活动之间的动态关系。在这样做,我们提供一些贡献。
首先,我们之间的第一次直接观察到的口碑链接
吸纳新客户。其次,我们将展示如何配装有口碑与传统营销的措施(例如,增加口碑营销行动的活动,这反过来又增加了新的成员收购)的直接影响和间接影响。我们经验证明,我们的数据集,新加入的会员UPS,这些营销变量之间的内生性。这突出表明,需要考虑到这些间接影响口碑与传统营销的效果,以避免偏估计。第三,我们量化和对比口碑和传统的营销行动,立即和长期弹性。特别是,我们结转效果强的口碑在我们的数据文件。最后,我们估计货币价值附加到每个口碑推荐,提供一个上限的财政奖励管理可能会考虑提供口碑推荐。事实上,这种做法的播种或刺激口碑已迅速增长,但这一活动的有效性仍然很难量化(例如,戈德斯和Mayzlin 2004的)。
我们本文的其余部分组织如下:首先,我们总结前人的研究,以帮助的角度,把我们的贡献。然后,我们描述我们的建模方法。接下来,我们提出了我们的实证分析的数据合作的互联网社交网站,并提供理论和管理者的影响。特别是,我们发现,口碑推荐强烈影响收购新客户,并具有比传统的营销形式由该公司与3至7天(21天)显着较长的结转。我们估计口碑的长期弹性为0.53-约20-30倍,高于传统营销的弹性。
Social Network Sites: Definition, History, and Scholarship
danah m.boyd, Nicole B.Ellison
Journal of Computer-Mediated Communication, Volume 13, Issue 1, pages 210–230, October 2007
Social Network Sites: Definition We define social network sites as web-based services that allow individuals to(1)construct a public or semi-public profile within a bounded system,(2)articulate a list of other users with whom they share a connection, and(3)view and traverse their list of connections and those made by others within the system.The nature and nomenclature of these connections may vary from site to site.While we use the term ―social network site‖ to describe this phenomenon, the term ―social networking sites‖ also appears in public discourse, and the two terms are often used interchangeably.We chose not to employ the term ―networking‖ for two reasons: emphasis and scope.―Networking‖ emphasizes relationship initiation, often between strangers.While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication(CMC).What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks.This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between ―latent ties‖(Haythornthwaite, 2005)who share some offline connection.On many of the large SNSs, participants are not necessarily ―networking‖ or looking to meet new people;instead, they are primarily communicating with people who are already a part of their extended social network.To emphasize this articulated social network as a critical organizing feature of these sites, we label them ―social network sites.‖
While SNSs have implemented a wide variety of technical features, their backbone consists of visible profiles that display an articulated list of Friends1 who are also users of the system.Profiles are unique pages where one can ―type oneself into being‖(Sundén, 2003, p.3).After joining an SNS, an individual is asked to fill out forms containing a series of questions.The profile is generated using the answers to these questions, which typically include descriptors such as age, location, interests, and an ―about me‖ section.Most sites also encourage users to upload a profile photo.Some sites allow users to enhance their profiles by adding multimedia content or modifying their profile’s look and feel.Others, such as Facebook, allow users to add modules(―Applications‖)that enhance their profile.The visibility of a profile varies by site and according to user discretion.By default, profiles on Friendster and Tribe.net are crawled by search engines, making them visible to anyone, regardless of whether or not the viewer has an account.Alternatively, LinkedIn controls what a viewer may see based on whether she or he has a paid account.Sites like MySpace allow users to choose whether they want their profile to be public or ―Friends only.‖ Facebook takes a different approach—by default, users who are part of the same ―network‖ can view each other’s profiles, unless a profile owner has decided to deny permission to those in their network.Structural variations around visibility and access are one of the primary ways that SNSs differentiate themselves from each other.After joining a social network site, users are prompted to identify others in the system with whom they have a relationship.The label for these relationships differs depending on the site—popular terms include ―Friends,‖―Contacts,‖ and ―Fans.‖ Most SNSs require bi-directional confirmation for Friendship, but some do not.These one-directional ties are sometimes labeled as ―Fans‖ or ―Followers,‖ but many sites call these Friends as well.The term ―Friends‖ can be misleading, because the connection does not necessarily mean friendship in the everyday vernacular sense, and the reasons people connect are varied(boyd, 2006a).The public display of connections is a crucial component of SNSs.The Friends list contains links to each Friend’s profile, enabling viewers to traverse the network graph by clicking through the Friends lists.On most sites, the list of Friends is visible to anyone who is permitted to view the profile, although there are exceptions.For instance, some MySpace users have hacked their profiles to hide the Friends display, and LinkedIn allows users to opt out of displaying their network.Most SNSs also provide a mechanism for users to leave messages on their Friends’ profiles.This feature typically involves leaving ―comments,‖ although sites employ various labels for this feature.In addition, SNSs often have a private messaging feature similar to webmail.While both private messages and comments are popular on most of the major SNSs, they are not universally available.Not all social network sites began as such.QQ started as a Chinese instant messaging service, LunarStorm as a community site, Cyworld as a Korean discussion forum tool, and Skyrock(formerly Skyblog)was a French blogging service before adding SNS features.Classmates.com, a directory of school affiliates launched in 1995, began supporting articulated lists of Friends after SNSs became popular.AsianAvenue, MiGente, and BlackPlanet were early popular ethnic community sites with limited Friends functionality before re-launching in 2005–2006 with SNS features and structure.While SNSs are often designed to be widely accessible, many attract homogeneous populations initially, so it is not uncommon to find groups using sites to segregate themselves by nationality, age, educational level, or other factors that typically segment society(Hargittai, this issue), even if that was not the intention of the designers.Word-of-mouth communication strategies are appealing because they combine the prospect of overcoming consumer resistance with significantly lower costs and fast delivery—especially through technology, such as the Internet.Unfortunately, empirical evidence is currently scantregarding the relative effectiveness of WOM marketing in increasing firm performance over time.This raises the need to study how firms can measure the effects of WOM communications and how WOM compares with other forms of marketing communication.Word-of-mouth marketing is a particularly prominent feature on the Internet.The Internet provides numerous venues for consumers to share their views, preferences, or experiences with others, as well as opportunities for firms to take advantage of WOM marketing.As one commentator stated, ―Instead of tossing away millions of dollars on Superbowl advertisements, fledgling dot-com companies are trying to catch attention through much cheaper marketing strategies such as blogging and [WOM] campaigns‖(Whitman 2006, p.B3A).Thus, it is important to understand whether WOM is truly effective and, if so, how its impact compares with traditional marketing activities.One of the fastest-growing arenas of the World Wide Web is the space of so-called social networking sites.A social networking site is typically initiated by a small group of founders who send out invitations to join the site to the members of their own personal networks.In turn, new members send invitations to their networks, and so on.Thus, invitations(i.e., WOM referrals)have been the foremost driving force for sites to acquire new members.As social networking sites mature, they may begin to increase their use of traditional marketing tools.Therefore, management may begin to question the relative effectiveness of WOM at this stage.The objective of this research is to develop and estimate a model that captures the dynamic relationships among new member acquisition, WOM referrals, and traditional marketing activities.In doing so, we offer several contributions.First, we are among the first to link observed WOM directly to new customer acquisition.Second, we show how toincorporate both the direct effects and the indirect effects of WOM and traditional marketing actions(e.g., a marketing action increases WOM activity, which in turn increases new member acquisition).We empirically demonstrate, for our data set, the endogeneity among new member sign-ups and these marketing variables.This highlights the need to account for these indirect effects to avoid biased estimates for both WOM and traditional marketing effects.Third, we quantify and contrast the immediate and long-term elasticities of WOM and traditional marketing actions.In particular, we document strong carryover effects for WOM in our data.Finally, we attach an estimated monetary value to each WOM referral, providing an upper bound to the financial incentive management might consider offering for WOM referrals.Indeed, the practice of seeding or stimulating WOM has grown rapidly, but quantifying the effectiveness of this activity remains difficult(e.g., Godes and Mayzlin 2004).We organize the remainder of this article as follows: We begin by summarizing previous research to help put our contributions in perspective.We then describe our modeling approach.Next, we present our empirical analysis of the data from a collaborating Internet social networking site and offer implications for theory and managers.In particular, we find that WOM referrals strongly affect new customer acquisitions and have significantly longer carryover than traditional forms of marketing used by the firm(21 days versus 3 to 7 days).We estimate a long-term elasticity for WOM of.53—approximately 20–30 times higher than the elasticities for traditional marketing.
第五篇:引进外资外文翻译资料
河南科技学院新科学院
2013届本科毕业生论文(设计)
英文文献及翻译
Foreign capital inflows and welfare in an economy with
imperfect competition
学生姓名:王艳杰
所在院系:经济系
所学专业:国际经济与贸易
导师姓名:侯黎杰
完成时间: 2013年4月15日
Foreign capital inflows and welfare in an economy with imperfect competitionAbstract:This paper examines the resource allocational and welfare effects ofexogenous inflows of foreign capital in a general-equilibrium model witholigopolistic competition and unemployment.Although the welfare impact for theshort run is ambiguous and dependent upon the strength of excess profits and scale economies relative to unemployment in manufacturing, in the long run additional inflows of foreign capital always improve national welfare with capital mobility.Hence, attracting foreign capital remains a sound policy for economies characterized by imperfect competition, scale economies,and regional unemployment.Keywords:Internationalcapitalmobility;Imperfectcompetition;Welfare
1.Introduction
The welfare effects of exogenous inflows of foreign capital in the presence of trade restrictions have been extensively studied.Brecher and Diaz Alejandro(1977)show that when imports are subject to tariffs, an introduction of foreign capital inflows accentuates the tariff distortion and hence reduces national welfare if the import-competing sector is relatively capital-intensive.In contrast, Dei(1985)shows that when imports are restricted by quotas,foreign capital inflows in the presence of foreign-owned capital always improve welfare by depressing the rental and solowering the payments to existing foreign-owned capital.Recently, Neary(1981), using a common framework for both tariffs and quotas, obtains more general resultsof foreign capital inflows;the welfare effect of such inflows depends crucially on whether foreign-owned capital exists initially in the home country.In addition, Khan(1982)and Grinols(1991)have examined the effects of foreign capital inflows for a generalized Harris-Todaro economy under tariff protection.Khan finds that the result by Brecher and Diaz Alejandro is still valid even in the presence of unemployment, whereas Grinols argues that increased foreign capital need not be detrimental to welfare if the opportunity costs of labor are sufficiently low.Noteworthy is that the models used by these authors are all based upon the premise of perfect competition along with constant returns-to-scale technology.Although perfect competition serves as a useful assumption in crystallizing theoretical insights, it nevertheless fails to depict many of the real-world phenomena.The real-world economy is characterized, to a large extent, by imperfect competition and economies of scale.The policy implications of imperfect competition and economies
of scale have been examined in the recent literature(see, for example, Brander and Spencer(1985)), mostly dealing with developedeconomies.Krueger(1984)in her survey points out that though market imperfections exist indeveloped nations, the imperfections are far more serious and pervasive in developingcountries.Rodrik(1981), in an illuminating paper, reports that most developing nations have very high four-firm concentration ratios.He finds that a developing economy is typically characterized by(1)restricted entry in manufacturing partlybecause of the absence of serious antitrust policies;(2)high protection of the manufacturing sector by quotas rather than tariffs;and(3)imperfect home capital markets and, thus, sluggish movements of capital among sectors.The purpose of the present paper is to develop a model to incorporate these key features of imperfect competition characterizing a developing economy.In addition to the above-mentioned features as noted by Rodrik, we also introduce in our framework sector-specific unemployment frequently observed in a developing nation.The model will then be utilized to examine the welfare implications of foreign capital inflows.It will be shown that foreign capital inflows in the presence of a given quota may be detrimental to welfare in the short run in which capital is sector-specific;the inflows, however, are in the long run necessarily welfare improving with inter sectoral capital mobility.Since perfect competition is a limiting case of imperfect competition modeled in this paper, Dei’s result regarding welfare-improving foreign capital can be viewed as a special case of the present analysis.We construct a general-equilibrium model to capture the key salient features of imperfect competition for developing economies in Section 2.The resource-alloc-ational effects of foreign capital inflows in the presence of quantitative restrictions are examined in Section 3.The welfare impact of foreign capital inflows is discussed in Section 4.Section5 presents concluding remarks.2.Concluding remarks
This paper has examined the effects of inflows of foreign capital on home resource allocation and welfare in a general-equilibrium framework.The home country is characterized by oligopolistic competition, scale economies, and regional unemployment.Although the welfare effect of foreign capital for the short run is somewhat indeterminate and is dependent on the magnitude of the effects of excess profits and scale economies(relative to the unemploymenteffect in manufacturing),the inflows of foreign capital always improve welfare for such economies in the long run with capital mobility.Our results, which stand in sharp contrast to those derived in the presence of tariffs(Beecher and Dial Alejandro, 1977), lend support to the finding of Dei(1985).Dei’s key result is generalized to economies with imperfect competition in the short run and imperfect competition, along with regional unemployment, in the long run.The use of quasi linear preferences in this paper serves to focus on the price effect by suppressing the income effects on the demand for goods.It may be noted thatwhen the income effects are presented in the model via more general preferences, the demand for goods would be further raised in the case of inter sectoral mobility of capital.Hence, foreign capital inflows would be more welfare-improving in the long run.Bakra, R.N.and N.Naevi, 1987, Urban unemployment and the gains from trade,Economic 54, 381-3Y6.Bela di, H., 1988, Variable returns to scale, urban unemployment and welfare,Southern Economic Journal 55, 412-423.Brander, J.A.and B.J.Spencer, 1985, Export subsidies and international marketshare rivalry, Journal of International Economics 18, X3-100.Beecher, R.A.And C.F.Dial Alejandro 1977,Tariffs,foreign capital and immiserizing growth, Journal
译文:
外国资本流入和福利经济的不完全竞争
摘要:本文探讨了在寡头竞争和失业的一般均衡模型下,资源配置和外国资本流入的福利效益。虽然福利影响短期内是不确定的,而且它依赖于超额利润的强度并取决于制造业中失业人数的规模经济,从长远来看,额外的资本流入总是能提高国民福利与资本流动。因此,吸引外资对于具有不完全竞争、规模经济和区域失业特点的经济忍让是一个良好的政策。
关键词: 国际资本流动; 不完全竞争;福利
1、引言
在贸易限制领域,外国资本流入的福利效应已经被广泛研究。布雷赫尔和迪亚兹﹒亚历杭德罗(1977)表明,当进口受制于关税,外国资本流的引进加剧了关税失真,因此若果进口竞争部门是相对的资本密集型企业就会降低减少国家福利。相反,DEI(1985)表明,当进口受配额限制,外商独资领域的外国资本流入总是能通过压低租金来改善福利,因此也降低了给现有的外商独资资本的支付。最近,通过使用一个关税和配额的共同框架,尼尔瑞(1981)获得了更多外国资本的流入的一般结论;流入资本的这种福利效应很大程度上取决于外商独资资本最初在本国的福利效应。此外,柯汗(1982)和格里诺尔斯(1991)探讨了外国资本流入对一个广义的在关税保护下的哈里斯——托达罗经济的影响。柯汗发现布雷赫尔和迪亚兹﹒亚历杭德罗的结果即使在失业存在的情况下仍然是有效的,而格里诺尔斯认为,增加外国资本必须不损害福利,如果劳动力的机会成本足够低。
值得注意的是,这些作者所使用的模型都是基于完全竞争与规模报酬不变的前提。尽管完全竞争是具体的理论见解中的一个有用假设,但它无法描绘现实世界中的许多现象。真实经济的特点,在很大程度上,是不完全竞争和规模经济。对不完全竞争和规模经济的政策含义已经出现在最近的文献研究(见,例如,Brander和Spencer(1985)),主要是用来处理发达经济体。
克鲁格(1984)在她的调查种指出,尽管在发达国家存在市场缺陷,但这种缺陷在发展中国家更为严重和普遍。洛迪克(1981),在一篇启蒙论文中,报告说大多数发展中国家都有很高的四企业集中率。他认为,发展型经济体的典型特征是(1)限制制造业企业的进入部分原因是由于严重的反垄断政策的缺失;(2)通过配额而不是关税来加强制造业的保护;(3)不完善的国内资本市场,因此,部门间的资本流动缓慢。
本文的目的是建立一个模型,把这些表征发展型经济的不完全竞争特点融合在一起。除了上述洛迪克提出的特点,我们也将在我们的框架中介绍在发展中国
家观察到的特定行业的经常性失业。该模型然后会被用来研究外国资本流入的福利效益。它将表明,从短期来看,在一个给定配额的情况下特定行业的资本流入可能有损于福利;但是从长远来看,资本流入必然改善部门之间的资本流动。由于完全竞争是是本文中的不完全竞争的一种极限情况,DEI的关于改善福利的外资的研究结果可以被看做是目前分析情况下的一个特殊案例。在第二部分我们构建了一个一般均衡模型来捕获发展型经济体关于不完全竞争的显著特征。第三节讨论了在数量限制情况下外国资本流入的资源配置效益。外国资本的流入对福利的影响在4节讨论。第五节提出结论性意见。
2、结束语
本文在一般均衡框架考察外国资本流入对国内资源的分配和福利的影响。本国的特点是寡头竞争,规模经济,以及地区性失业。虽然从短期来看外国资本流入的福利效益是不确定的,依赖于超额利润的影响和规模经济的效益(相对于制造业中的失业效应),从长期来看,外国资本流入总是能改善这种经济体资本流动的福利。
我们的研究结果,和那些起源于关税存在的观点形成鲜明对比(布雷赫尔和迪亚兹Alejandro,1977),支持DEE的发现(1985)。DEI的关键结果短期内伴随着不完全竞争的广义经济,长期来看伴随着区域失业。
在本文中,准线性偏好的使用致力于通过抑制商品需求的收入效应而获得的价格效益。可以指出的是,当收入效益在模型中被通过更一般的喜好而展现出来,在跨部门资本流动情况下,商品需求将被更进一步的提高。因此,外国资本流入将更多的从长远来改善福利。
参考文献
[1]巴特拉,注册护士和N.纳克维,1999,城市失业和贸易,经济54的收益,381-3y6。
[2]Beladi,H.,1988,规模报酬可变,城市失业和福利,南方经济杂志55,412-423。
[3]布兰德,J.A.,B.J.斯宾塞,2003,出口补贴和国际市场份额的竞争,国际经济学杂志18,x3-100。
[4]布雷彻,迪亚兹Alejandro 1977,关税,外国资本和贫困化增长,杂志